Artificial Intelligence Is a Threat to Cybersecurity. It’s Also a Solution. |
Technical Solutions, Social Solutions |
Industry |
2018 |
EXPLAINING AND HARNESSING ADVERSARIAL EXAMPLES |
Technical Solutions |
Unmet Needs |
2018 |
National Snow and Ice Data Center |
Activities, Problems, Technical Solutions |
Energy |
2018 |
What makes cybercrime laws so difficult to enforce. |
Technical Solutions |
Industry |
2018 |
Taiwan Heist: Lazarus Tools and Ransomware |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2018 |
The Living Planet Report |
Problems, Technical Solutions |
Consumption, Energy, Industry, Mobility |
2018 |
The Truth About Machine Learning in Cybersecurity: Defense |
Technical Solutions |
Industry |
2018 |
The SDG Academy (education) |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Energy, Land Use, Governance, Population, Urbanization, Water |
2018 |
Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures |
Technical Solutions |
Industry |
2018 |
Triton is the world’s most murderous malware, and it’s spreading |
Activities, Technical Solutions |
Industry |
2019 |
Trump’s cyber workforce order gets bipartisan praise |
Technical Solutions, International Responses |
Governance |
2019 |
Insurers Creating a Consumer Ratings Service for Cybersecurity Industry |
Technical Solutions, Social Solutions |
Industry, Trade |
2019 |
How Cybercriminals Change Tactics During Their Cyber Attacks |
Activities, Technical Solutions |
Industry |
2019 |
Best Practices for Operating Government-Industry Partnerships in Cyber Security |
Technical Solutions, Social Solutions |
Governance, Industry |
2019 |
Explained: US, China's undersea battle for control of global internet grid |
Technical Solutions |
Industry |
2019 |
How Chinese Spies Got the N.S.A’s Hacking Tools, and Used Them for Attacks |
Technical Solutions |
Industry |
2019 |
U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms |
Technical Solutions, International Responses |
Governance |
2019 |
Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security |
Technical Solutions, International Responses |
Industry |
2019 |
Can artificial intelligence spot spam quicker than humans? |
Technical Solutions |
Industry |
2019 |
Norsk Hydro Hit with ‘Severe’ LockerGoga Ransomware Attack |
Technical Solutions |
Industry |
2019 |
AI Policy – United States |
Technical Solutions |
Governance |
2019 |
Hackers TRICKED a Tesla: The Race to Fooling Artificial Intelligence |
Technical Solutions, Social Solutions |
Industry |
2019 |
Dark web crime markets targeted by recurring DDoS attacks |
Technical Solutions |
Industry |
2019 |
How far should organizations be able to go to defend against cyberattacks? |
Activities, Technical Solutions |
Industry |
2019 |
Facebook Data Breach Suggests the Public Sees Cybersecurity as Obsolete |
Technical Solutions |
Industry |
2019 |
Going Toe-to-Toe With Ukraine’s Separatist Hackers |
Technical Solutions, Social Solutions, International Responses |
Industry |
2019 |
On the Effectiveness of Machine and Deep Learning for Cyber Security |
Technical Solutions |
Industry |
2019 |
Can AI Become Our New Cybersecurity Sheriff? |
Technical Solutions |
Industry |
2019 |